Background: How much information is too much information when it comes to sharing information on Facebook? Sharing becomes a personal risk when you cross the line of sharing about personal information such as location and schedules. Stalkers attract to people that overshare because it provides easy guidelines about their life.

How I Used It: I used this source to provide readers about stalkers taking advantage of easy access to Facebook timelines and limitless information about your life based on your privacy settings.

Background: The U.S Supreme Court considers whether social media is a privilege or a right in modern society. The court reviewed a case of a convict from a incident that occurred in college eight years ago. The question is whether the law infringes on freedom of speech rights and if social media is a medium of communication protected under the First Amendment.

How I Used It: I used this source as an example explaining what connection the law has to predators being on social media and what are the consequences if being caught in the act violating a sexual predators guidelines.

Background: This article presents the negative impact of social media in three categories being: social media presents several false identities and connections leading to emotional and psychological problems. Second being very addictive and third being it has become a tool for criminals, predators and terrors to commit illegal acts. This article shows the connection between the psychological problems caused by social media and criminal activities committed.

How I Used It: I used this source to show how online “friendships” can lead to dangers in aspects of kidnapping, sexual abuse, and psychological damages.

Background: Facebook and Twitter are so overpopulated that prevents, pedophiles, and rapists using the platforms are growing in numbers. The number of sexual assaults cases related to both social media sites has reached incredible heights. Facebook has over a billion users, making it nearly impossible to control who joins which is what sex offenders are counting on. The FBI has released a guide to Internet safety.

How I Used It: I used this source for statistics on the number of people using Facebook and the number of followers each person has.

Background: Sexual predators have found ways to victimize users from online. They do this by hiding behind fake profiles to lure victims, using profile information to stalk their victims in real life or hacking into accounts to blackmail victims, sexual predators pose very real dangers for users on social media sites.

How I Used It: I used this source to explain how predators locate and imitate contact with potential victims. And how this can lead to real life stalking. I also used this source to talk about what privacy settings to use and what precautions to take.

Background: American teens today grow up in a world surrounded by mass media. The media depict a world in which unhealthy behaviors such as physical aggression, unprotected sex, smoking, and drinking are glamorous and risk free. Americans always have the worries about the harmful effects of the mass media on children and adolescents.

How I Used It: I used this source to explain the media effects on adolescents’ health.

Background: One in five teenagers who regularly log on to the Internet says they have received an unwanted sexual solicitation via the Web. Internet sexual predators fall in-between the ages of 18 and 55, their targets tent to be between the ages of 11 and 15. Teens are willing to meet with strangers. 75% of children are willing to share personal information online.

Background: Social network websites are widely used by adolescents, but disclosing in this environment has inherent risks. The authors explore the relationship between having a negative relationship between having a negative experience,privy knowledge, and behavior.

How I Used It: I used this source for examples about protecting privacy and the risks of online disclosure.

Background: The fastest growing segment of new users are pre teens and teens. Facebook’s age limit is 13 but it is very easy for kids to lie about their age. Social networking also makes children that target of cruel jokes from their peers. The average Facebook user has 135 friends and each of those friends has an average of 135 friends. The greatest danger to teens on social media is not what they do online but what others do and say about them.

How I Used It: I used this source to explain how parents can watch over their children’s social media profiles.

Background: People are way to trusting on social media sites. Do not friend people that you do not know. And be careful on how much information you put on social media. Hackers gain access to systems by targeting teens.

How I Used It: I used this article to use as an example of a real life story on how hackers and sexual predators pose as young teens to draw teenagers in and get them to meet them at a location and kidnap them.

Background: facebook is the most used social media website. 95% of teens use the internet, and 81% of them use social media sites. Teen sharing and visits to social media sites have hit a high with heavy users. Teens on Facebook are good with using privacy settings, with 60 percent saying their profiles and updates are “private”. In general, girls are more likely than boys to have private profiles.

How I Used It: I used this document for statistics, it was very helping displaying charts and average number of how many followers men compared to women have. A report explains social media profiles and what teens post in 2006 compared to 2012.

Background: The Internet is becoming a dangerous place for children and teenagers whose online profiles often attract aggressive sexual predators. Internet sex crimes involving adults and juveniles more often fit a model of statutory rape. With prevention strategies it will provide adolescents with awareness skills while educating older youths about the pitfalls of sexual relationships with adults and their criminal nature.

How I Used It: I used this source to explain how internet sex offenders operate. I also used this article to explain how youths can make themselves vulnerable to online child molesters.

Background: Online offenders are a distinct group of sex offenders or if they are just sexual offenders using new technology. Online and offline offenders reported greater rates of childhood physical and sexual abuse than the general population. Online offenders are more likely to be Caucasian, single, and unemployed.

How I Used It: I used this article to demonstrate the differences and similarities between online and offline offenders.

Background: The public has focused on the possibility that social networking sites are being used to sexually solicit underage youth. Prevention efforts may have a big impact if they focus on the psychosocial problems of youth instead of a specific Internet application, including funding for online youth outreach programs, school anti bullying programs and online mental health services.

How I Used It: I used this source to explain outcomes were unwanted sexual solicitation on the Internet and provide statistics of how many unwanted sexual solicitation online in the last year.

Background: This article explores changes in the prevalence of youth Internet users reporting unwanted sexual solicitations between 2000 and 2005, as well as the risk factors related to reports of the most serious solicitations, aggressive solicitations, in which solicitors attempted or made offline contact with youth.

How I Used It: I used this article to state the dangers for women because they are the most at risk. Risk factors include using chat rooms, using the Internet with a cell phone, talking with people met online and sending personal information to people met online.

2 Responses to Bibliography—therealmoana

Moana, in this digital publishing age, authors have a responsibility to link readers to their online sources whenever possible. You haven’t done that here, but I will demonstrate the simple technique in class tomorrow. As an example, I linked your first title to its url.